Skip to main content E-Gov logo Powering America's future with technology.
 
 

Defines the set of capabilities that support the protection of an organization's hardware/software and related assets.

  • Access Control

    Defines the set of capabilities that support the management of permissions for logging onto a computer or network.

  • Audit Trail Capture and Analysis

    Defines the set of capabilities that support the identification and monitoring of activities within an application or system.

  • Digital Signature

    Defines the set of capabilities that guarantee the unaltered state of a file.

  • Encryption

    Defines the set of capabilities that support the encoding of data for security purposes.

  • Identification and Authentication

    Defines the set of capabilities that support obtaining information about those parties attempting to log on to a system or application for security purposes and the validation of those users.

  • Intrusion Detection

    Defines the set of capabilities that support the detection of illegal entrance into a computer system.

  • Role / Privilege Management

    Defines the set of capabilities that support the granting of abilities to users or groups of users of a computer, application or network.

  • User Management

    Defines the set of capabilities that support the administration of computer, application and network accounts within an organization.

  • Verification

    Defines the set of capabilities that support the confirmation of authority to enter a computer system, application or network.